Sciweavers

690 search results - page 28 / 138
» Multi-Agent Only Knowing
Sort
View
CSREASAM
2003
13 years 10 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
JCM
2008
74views more  JCM 2008»
13 years 8 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
ESA
2009
Springer
98views Algorithms» more  ESA 2009»
14 years 3 months ago
The Oil Searching Problem
Given n potential oil locations, where each has oil at a certain depth, we seek good trade-offs between the number of oil sources found and the total amount of drilling performed. ...
Andrew McGregor, Krzysztof Onak, Rina Panigrahy
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 9 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
ATAL
2011
Springer
12 years 8 months ago
Reasoning about local properties in modal logic
In modal logic, when adding a syntactic property to an axiomatisation, this property will semantically become true in all models, in all situations, under all circumstances. For i...
Hans P. van Ditmarsch, Wiebe van der Hoek, Barteld...